-
5601
An Extended Virtual Force-Based Approach to Distributed Self-Deployment in Mobile Sensor Networks
Published 2012-03-01“…To overcome the connectivity maintenance and nodes stacking problems in the traditional virtual force algorithm (VFA), an extended virtual force-based approach is investigated to achieve the ideal deployment. …”
Get full text
Article -
5602
Dubhe: A Reliable and Low-Latency Data Dissemination Mechanism for VANETs
Published 2013-12-01“…In order to reliably and quickly disseminate the data, we present Dubhe which includes a delay model and an improved greedy broadcast algorithm embedded with a coverage elimination rule. …”
Get full text
Article -
5603
Intrusion detection method for IoT in heterogeneous environment
Published 2024-04-01“…Subsequently, an innovative heterogeneous model aggregation algorithm was introduced, utilizing similarity-weighted coefficients for channel averaging, thereby effectively mitigating the adverse effects of Non-IID data during the model aggregation process. …”
Get full text
Article -
5604
Pruning Bayesian networks for computationally tractable multi-model calibration
Published 2025-05-01“…In this work, we propose a graph pruning algorithm to reduce computational cost while minimizing the loss in calibration ability by incorporating domain-driven metrics for selection purposes. …”
Get full text
Article -
5605
Skip-Connected CNN Exploiting BNN Surrogate for Antenna Modelling
Published 2025-01-01“…The combination of evolutionary algorithms with full-wave electromagnetic (EM) simulation software is an effective method for antenna optimal design. …”
Get full text
Article -
5606
High-Precision Spotlight SAR Imaging with Joint Modified Fast Factorized Backprojection and Autofocus
Published 2020-01-01“…Fast factorized backprojection (FFBP) takes advantage of high accuracy of time-domain algorithms while also possessing high efficiency comparable with conventional frequency domain algorithms. …”
Get full text
Article -
5607
Normative Production Accounting in the Digital Economy: Issues and Solutions
Published 2018-08-01“…It was determined that the formula for the normative method requires modification while the algorithm for allocation of indirect costs requires justification and interpretation. …”
Get full text
Article -
5608
Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection
Published 2021-01-01“…An integrated approach of machine learning with knowledge-based system is proposed for intrusion detection. While machine learning algorithm is used to construct a classifier model, knowledge-based system makes the model scalable and adaptive. …”
Get full text
Article -
5609
Thermal pure states for systems with antiunitary symmetries and their tensor network representations
Published 2024-12-01“…Thermal pure state algorithms, which employ pure quantum states representing thermal equilibrium states instead of statistical ensembles, are useful both for numerical simulations and for theoretical analysis of thermal states. …”
Get full text
Article -
5610
Client grouping and time-sharing scheduling for asynchronous federated learning in heterogeneous edge computing environment
Published 2023-11-01“…., edge heterogeneity, data Non-IID, and communication resource constraints, a grouping asynchronous federated learning (FedGA) mechanism was proposed.Edge nodes were divided into multiple groups, each of which performed global updated asynchronously with the global model, while edge nodes within a group communicate with the parameter server through time-sharing communication.Theoretical analysis established a quantitative relationship between the convergence bound of FedGA and the data distribution among the groups.A time-sharing scheduling magic mirror method (MMM) was proposed to optimize the completion time of a single round of model updating within a group.Based on both the theoretical analysis for FedGA and MMM, an effective grouping algorithm was designed for minimizing the overall training completion time.Experimental results demonstrate that the proposed FedGA and MMM can reduce model training time by 30.1%~87.4% compared to the existing state-of-the-art methods.…”
Get full text
Article -
5611
RESEARCH ON PARAMETRIC ANALYSIS AND MULTI-OBJECTIVE OPTIMIZATION OF CYLINDRICAL PRESSURE STRUCTURE
Published 2021-01-01“…In order to improve the design efficiency and performance of the cylindrical pressure structure,strength and stability analysis methods were determined,the initial scheme was analyzed. the second development of Abaqus software was carried out by using Python language,Abaqus was integrated with i Sight software,the parametric analysis flow of pressure structure was designed,could realize automatic modeling and analysis of cylindrical pressure structure. the most Latin hypercube method was used to selectting the sample points,the sensitivity analysis of the design variables were carried out,The comparison of the fitting accuracy shown that the response surface model had the highest accuracy,the approximate model of the cylindrical pressure structure based on the fourth-order response surface was obtained. the multi-objective optimization model was established,The second generation of non dominated sorting genetic algorithm was used to solving the multi-objective optimization problem,the results shown that the weight of the optimization scheme was reduced,while the ultimate strength was greatly improved,improved the performance of the cylindrical pressure structure.…”
Get full text
Article -
5612
Machine Learning G-Code Optimization
Published 2024-11-01“…This research applies the K-means machine learning clustering algorithm to optimize G-code parameters such as extruder and heated bed temperature, deposition speed, and flow control. …”
Get full text
Article -
5613
Indoor positioning system for wireless sensor networks based on two-stage fuzzy inference
Published 2018-05-01“…In this article, we present a two-stage indoor positioning scheme using a fuzzy-based algorithm aimed at minimizing uncertainty in received signal strength indicator measures from reference nodes in wireless sensor networks. …”
Get full text
Article -
5614
Differential Evolution for Optimizing Model Parameters in Simulation of Direct Dimethyl Carbonate Synthesis
Published 2025-07-01“…The Differential Evolution (DE) algorithm was applied to optimize parameters of the model. …”
Get full text
Article -
5615
Dual Hiding in Digital Image Files
Published 2011-07-01“…In this paper, a modified algorithm is suggested depending on two principles: double information hiding and multiple watermarking. …”
Get full text
Article -
5616
Saliency Detection via Fusing Color Contrast and Hash Fingerprint
Published 2022-01-01“…Besides, another saliency map that enhances the salient region while restraining the background is also generated through hash fingerprint matching. …”
Get full text
Article -
5617
Inverse problems for discrete Hermite nabla difference equation
Published 2025-12-01“…Furthermore, a simple and fast recursive algorithm is proposed for computing corresponding eigenvectors. …”
Get full text
Article -
5618
A hybrid unsupervised machine learning model with spectral clustering and semi-supervised support vector machine for credit risk assessment.
Published 2025-01-01“…The effectiveness, efficiency, and robustness of the proposed TSC-SVM model are demonstrated through various real-world applications. The proposed algorithm is anticipated to expand the customer base for financial institutions while reducing economic losses.…”
Get full text
Article -
5619
A Hybrid Mobile Robot Path Planning Scheme Based on Modified Gray Wolf Optimization and Situation Assessment
Published 2022-01-01“…When combined with a situation assessment mechanism, it realizes dynamic obstacle avoidance while keeping the path length as short as possible.…”
Get full text
Article -
5620
TraIL: Pinpoint Trajectory for Indoor Localization
Published 2015-11-01“…Our basic idea is that WiFi-only localization can generate rough but absolute positions, while user motion is able to bring accurate but relative locations. …”
Get full text
Article